漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Multiple cross-site scripting (XSS) vulnerabilities in OpenDocMan 1.2.5 allow remote attackers to inject arbitrary web script or HTML via the last_message parameter to (1) add.php, (2) toBePublished.php, (3) index.php, and (4) admin.php; the PATH_INFO to the default URI to (5) category.php, (6) department.php, (7) profile.php, (8) rejects.php, (9) search.php, (10) toBePublished.php, (11) user.php, and (12) view_file.php; and (13) the caller parameter in a Modify User action to user.php.
漏洞信息
N/A
漏洞
N/A
漏洞
OpenDocMan 多个参数跨站脚本漏洞
漏洞信息
OpenDocMan 1.2.5版本中存在多个跨站脚本攻击漏洞。远程攻击者可以借助对(1)add.php,(2)toBePublished.php,(3)index.php,和(4)admin.php的last_message参数; 对(5)category.php,(6)department.php,(7)profile.php,(8)rejects.php,(9)search.php,(10) oBePublished.php,(11)user.php,和(12)view_file.php的默认URI
漏洞信息
N/A
漏洞
N/A